Sciweavers

2978 search results - page 62 / 596
» Operations Research
Sort
View
EUROSYS
2006
ACM
15 years 9 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
ICFP
1999
ACM
15 years 4 months ago
Programming Languages as Operating Systems (or Revenge of the Son of the Lisp Machine)
The MrEd virtual machine serves both as the implementation platform for the DrScheme programming environment, and as the underlying Scheme engine for executing expressions and pro...
Matthew Flatt, Robert Bruce Findler, Shriram Krish...
SIGMOD
2010
ACM
168views Database» more  SIGMOD 2010»
15 years 4 months ago
SimDB: a similarity-aware database system
The identification and processing of similarities in the data play a key role in multiple application scenarios. Several types of similarity-aware operations have been studied in ...
Yasin N. Silva, Ahmed M. Aly, Walid G. Aref, Per-&...
ICDE
2009
IEEE
138views Database» more  ICDE 2009»
14 years 9 months ago
Similarity Group-By
The identification and processing of similarities in the data play a key role in multiple application scenarios. Several types of similarity-aware operations have been studied in ...
Yasin N. Silva, Walid G. Aref, Mohamed H. Ali
CPC
2010
95views more  CPC 2010»
14 years 9 months ago
First-Passage Percolation with Exponential Times on a Ladder
We consider first-passage percolation on a ladder, i.e. the graph N
Henrik Renlund